The Dark Web: An Exploration of the Shadowy Corners of the Internet

[{“box”:0,”content”:”[if 992 equals=”Open Access”]

n

Open Access

n

[/if 992]n

n

Year : April 3, 2024 at 4:00 pm | [if 1553 equals=””] Volume :11 [else] Volume :11[/if 1553] | [if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] : 01 | Page : –

n

n

n

n

n

n

By

n

    n t

    [foreach 286]n

    n

    B.M. Rajesh, Gobika S., Lavanya Mahalakshmi B.

  1. [/foreach]

    n

n

n[if 2099 not_equal=”Yes”]n

    [foreach 286] [if 1175 not_equal=””]n t

  1. Assistant Professor, Student, Student, Department of Information Technology, Dr. N.G.P. Arts and Science College, Coimbatore, Department of Information Technology, Dr. N.G.P. Arts and Science College, Coimbatore, Department of Information Technology, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, Tamil Nadu, Tamil Nadu, India, India, India
  2. n[/if 1175][/foreach]

[/if 2099][if 2099 equals=”Yes”][/if 2099]nn

n

Abstract

nThe Internet consists of two main segments: the “Surface Web” and the “Deep Web.” The Surface Web encompasses all publicly accessible and indexed websites, while the Deep Web comprises unindexed pages. Within the Deep Web, the “dark web” constitutes the most substantial component, housing concealed content on the World Wide Web. To utilize it, specific settings, authentication, and software are needed. The Onion Router, or TOR, is a multi-layer encryption technique that protects user privacy and confidentiality. The majority of internet users believe that the deep web and the black web are interchangeable, according to several research and polls. This article discusses the present makeup of the Internet and that portion of the World Wide Web, which comprises the Surface Web, the Deep Web, and the Dark Web, in order to clarify this and examine the structure of the Internet. This sentence discusses distinctions between the deep web and the dark web, highlighting the advantages of using the Tor browser in the dark web and its practical applications.

n

n

n

Keywords: Dark web, deep web, encryption, TOR, anonymous, privacy, access.

n[if 424 equals=”Regular Issue”][This article belongs to Journal of Web Engineering & Technology(jowet)]

n

[/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in Journal of Web Engineering & Technology(jowet)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

n

n

n

How to cite this article: B.M. Rajesh, Gobika S., Lavanya Mahalakshmi B. The Dark Web: An Exploration of the Shadowy Corners of the Internet jowet April 3, 2024; 11:-

n

How to cite this URL: B.M. Rajesh, Gobika S., Lavanya Mahalakshmi B. The Dark Web: An Exploration of the Shadowy Corners of the Internet jowet April 3, 2024 {cited April 3, 2024};11:-. Available from: https://journals.stmjournals.com/jowet/article=April 3, 2024/view=0

n


n[if 992 equals=”Open Access”] Full Text PDF Download[else] nvar fieldValue = “[user_role]”;nif (fieldValue == ‘indexingbodies’) {n document.write(‘Full Text PDF‘);n }nelse if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }nelse if (fieldValue == ‘jowet’) { document.write(‘Full Text PDF‘); }n else { document.write(‘ ‘); }n [/if 992] [if 379 not_equal=””]n

Browse Figures

n

n

[foreach 379]n

n[/foreach]n

nn

n

n[/if 379]n

n

References

n[if 1104 equals=””]n

1. Hurlburt G. Shining light on the dark web. Computer. 2017 Apr 1;50(04):100-5.
2. Bhushan B, Saxena S. The Dark Web: A Dive into the Darkest Side of the Internet. 2020. http://dx.doi.org/10.2139/ssrn.3598902
3. Henderson L. Tor & the Dark Art of Anonymity. mark hammer; 2015.
4. Bitcoin AM. Unlocking Digital Cryptocurrencies/Andreas M. Antonopoulos–K.: NGITS, 2014.
5. Sinha P, Jha VK, Rai AK, Bhushan B. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In2017 International Conference on Signal Processing and Communication (ICSPC) 2017 Jul 28 (pp. 288-293). IEEE.
6. Retzkin S. Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it. Packt Publishing Ltd; 2018 Dec 26.
7. Dalins J, Wilson C, Carman M. Criminal motivation on the dark web: A categorisation model for law enforcement. Digital Investigation. 2018 Mar 1;24:62-71.
8. Sharma M, Tandon A, Narayan S, Bhushan B. Classification and analysis of security attacks in WSNs and IEEE 802.15. 4 standards: A survey. In2017 3rd International conference on advances in computing, communication & automation (ICACCA)(Fall) 2017 Sep 15 (pp. 1-5). IEEE.
9. Biswas R, Fidalgo E, Alegre E. Recognition of service domains on TOR dark net using perceptual hashing and image classification techniques. In8th International Conference on Imaging for Crime Detection and Prevention (ICDP 2017) 2017 Dec 13 (pp. 7-12). IET.
10. Singh A, Sharma A, Sharma N, Kaushik I, Bhushan B. Taxonomy of attacks on web based applications. In2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) 2019 Jul 5 (Vol. 1, pp. 1231-1235). IEEE.
11. Lightfoot S, Pospisil F. Surveillance and privacy on the deep Web. ResearchGate, Berlin, Germany, Tech. Rep. 2017 May 5.
12. Senker C. Cybercrime and the DarkNet: Revealing the hidden underworld of the Internet. Arcturus Publishing; 2016 Sep 12.
13. Diodati J, Winterdyk J. Dark Web: The Digital World of Fraud and Rouge Activities. InHandbook of Research on Theory and Practice of Financial Crimes 2021 (pp. 477-505). IGI Global.
14. Gehl RW. Weaving the dark web: Legitimacy on Freenet, Tor, and I2P. MIT Press; 2018 Aug 14.
15. Davenport D. Anonymity on the Internet: why the price may be too high. Communications of the ACM. 2002 Apr 1;45(4):33-5.
16. Martin J, Munksgaard R, Coomber R, Demant J, Barratt MJ. Selling drugs on darkweb cryptomarkets: differentiated pathways, risks and rewards. The British Journal of Criminology. 2020 Apr 4;60(3):559-78.

nn[/if 1104][if 1104 not_equal=””]n

    [foreach 1102]n t

  1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/if 1106]
  2. n[/foreach]

n[/if 1104]

nn


nn[if 1114 equals=”Yes”]n

n[/if 1114]

n

n

[if 424 not_equal=””]Regular Issue[else]Published[/if 424] Subscription Review Article

n

n

n

n

n

Journal of Web Engineering & Technology

n

[if 344 not_equal=””]ISSN: 2455-1880[/if 344]

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n

n[if 2146 equals=”Yes”]

[/if 2146][if 2146 not_equal=”Yes”]

[/if 2146]n

n

n

Volume 11
[if 424 equals=”Regular Issue”]Issue[/if 424][if 424 equals=”Special Issue”]Special Issue[/if 424] [if 424 equals=”Conference”][/if 424] 01
Received November 7, 2023
Accepted January 15, 2024
Published April 3, 2024

n

n

n

n

n

n

nn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }n”}]